Threats and Actors: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 32: Line 32:


Moore, Tyler, et. al (2009) [[The Economics of Online Crime]]
Moore, Tyler, et. al (2009) [[The Economics of Online Crime]]
National Research Council (2007) [[Toward a Safer and More Secure Cyberspace]]


Nye, Joseph (2010) [[Cyber Power]]
Nye, Joseph (2010) [[Cyber Power]]

Revision as of 15:52, 9 July 2010

TOC->Threats and Actors

Anderson, Ross J. (2008) Security Engineering

Barkham, Jason (2001) Information Warfare and International Law on the Use of Force

Clarke, Richard A. and Knake, Robert (2010) Cyber War

Department of Defense (2005) Strategy for Homeland Defense and Civil Support

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Homeland Security (2003) The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

Energetics Inc. (2006) Roadmap to Secure Control Systems in the Energy Sector

Epstein, Richard A. and Brown, Thomas P. (2008) Cybersecurity in the Payment Card Industry

Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants

Grady, Mark F. and Parisi, Francesco (2006) The Law and Economics of Cybersecurity

Johnson, Eric M. (2008) Managing Information Risk and the Economics of Security

Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability

Kramer, Franklin D., et. al (2009) Cyberpower and National Security

Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing

Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing

Moore, Tyler, et. al (2009) The Economics of Online Crime

National Research Council (2007) Toward a Safer and More Secure Cyberspace

Nye, Joseph (2010) Cyber Power

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Rotenberg et. al. (2010) The Cyber War Threat Has Been Grossly Exaggerated

Schneier, Bruce (2003) Beyond Fear

Schneier, Bruce (2008) Schneier on Security

Stohl, Michael (2006) Cyber Terrorism

Thomas, Rob and Martin, Jerry (2006) The Underground Economy

Watts, Sean (2010) Combatant Status and Computer Network Attack

Jump to Table of Contents